We received a report that obfs4proxy doesn't run on Android Q due to a run-time linker error.
WARN: Managed proxy at '/data/app/org.torproject.torbrowser-xxxxxxxx==/lib/arm64/libObfs4proxy.so' reported: error: "/data/app/org.torproject.torbrowser-xxxxxxxx==/lib/arm64/libObfs4proxy.so": executable's TLS segment is underaligned: alignment is 8, needs to be at least 64 for ARM64 Bionic
As mentioned in ticket:32027#comment:3, this is not an obfs4proxy bug, but a golang-older-than-1.13 bug. We'll likely run into this problem with any go program/library on Android Q that was compiled older than v1.13. Other Android projects ran into this bug, as well (see #32027 (moved)).
I pondered getting the latest security updates for Go 1.12 into place for 9.0 but then decided against that/postponed that due to other important last minute fixes. Maybe we should pick that up while we are at dealing with Go?
go1.12.10 (released 2019/09/25) includes security fixes to the net/http and net/textproto packages. See the Go 1.12.10 milestone on our issue tracker for details.go1.12.11 (released 2019/10/17) includes security fixes to the crypto/dsa package. See the Go 1.12.11 milestone on our issue tracker for details.go1.12.12 (released 2019/10/17) includes fixes to the go command, runtime, syscall and net packages. See the Go 1.12.12 milestone on our issue tracker for details.
This bug was not backported, but getting bugfixes is a good idea, in general. I don't see any critical bugs that would affect Tor Browser, but I haven't looked at each bugfix in depth.
It's interesting that running obfs4proxy in Tor Browser 9 on an x86 Android emulator shows a different error for me (but still fatal):
- WARN: Managed proxy at '/data/app/org.torproject.torbrowser-mbH3STiraudHcuno3Pi09w==/lib/x86/libObfs4proxy.so' reported: runtime/cgo: pthread_key_create failed - WARN: Pluggable Transport process terminated with status code 6
I also hit an assertion failure in tor, but I'll come back to that later.
- NOTICE: Application request when we haven't used client functionality lately. Optimistically trying known bridges again.- TorService is shutting down- Using control port to shutdown Tor- NOTICE: Closing no-longer-configured HTTP tunnel listener on 127.0.0.1:8218 - NOTICE: Closing no-longer-configured Socks listener on 127.0.0.1:9150 - NOTICE: Closing no-longer-configured DNS listener on 127.0.0.1:5400 - NOTICE: Closing no-longer-configured Transparent pf/netfilter listener on 127.0.0.1:9140 - NOTICE: DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections. - sending HALT signal to Tor process- ERR: tor_assertion_failed_: Bug: src/core/mainloop/connection.c:5299: assert_connection_ok: Assertion (conn->type == 5 && conn->state == 1) || connection_is_writing(conn) || conn->write_blocked_on_bw || (((conn)->type == 5 || (conn)->type == 7) && TO_EDGE_CONN(conn)->edge_blocked_on_circ) failed; aborting. (on Tor 0.4.1.5 439ca48989ece545) - ERR: Bug: Assertion (conn->type == 5 && conn->state == 1) || connection_is_writing(conn) || conn->write_blocked_on_bw || (((conn)->type == 5 || (conn)->type == 7) && TO_EDGE_CONN(conn)->edge_blocked_on_circ) failed in assert_connection_ok
But it just occurred to me that this is pointless right now. We get obfs4proxy from tor-android-binary, it's not our build (and it's not our Go compiler). Sigh.
We could overwrite the obfs4proxy binary we get from tor-android-binary with our own in the tor-browser build, but ugh.
But it just occurred to me that this is pointless right now. We get obfs4proxy from tor-android-binary, it's not our build (and it's not our Go compiler). Sigh.
Indeed. :(
We could overwrite the obfs4proxy binary we get from tor-android-binary with our own in the tor-browser build, but ugh.
We don't have that yet, but I guess we could hack that up for the upcoming alpha using work boklm did for the snowflake integration. But I guess our best bet is the Guardian Project folks fixing this issue on short notice on their end. _hc, n8fr8: would that work?
Okay, this is working well (it seems). I tested aarch64. Unfortunately, it seems the runtime/cgo: pthread_key_create failed error is only triggered on Android Q emulators, so real devices are the only way we can test this right now, I think.
I split it into two patches: part 1 builds obfs4proxy for Android, and part 2 backports the patch for go.
Trac: Cc: eighthave, n8fr8 to eighthave, n8fr8, boklm Status: new to needs_review
I forgot to mention I pushed a new branch for this. It's on bug32303_02.
I pushed another commit that bumps the go version to 1.12.13 so we pick up the latest security patches (I haven't tested a full build with this yet).
GeKo asked if we can exclude the original obfs4proxy binary instead of simply overwriting it in the tor-browser build stage. It turns out this is an interesting question and reveals I should re-think this patch.
obfs4proxy comes from pluto, which is imported as a git submodule in tor-onion-proxy-library. The submodule uses 64faf224a90ec3ef8a806f9ec45c1caffafea768 which was commited in October 2018. So, this is a mess. pluto is not maintained anymore, and now TOPL should use https://github.com/guardianproject/AndroidPluggableTransports (with obfs4proxy coming from https://gitlab.com/eighthave/goptbundle, which is a fork of obfs4proxy). We shouldn't change this in this ticket, however.
I'll create another branch where we add obfs4proxy in the tor-onion-proxy-library project instead of tor-browser.
I pushed branch bug32303_04 for review. In the tor-onion-proxy-library project, this overwrites the obfs4proxy binaries bundled in pluto with the obfs4proxy binaries we build (instead of overwriting the file in the tor-browser project).
in commit ba3958be0dc37f019a56f46847e2d453fb5e6010 but no patch added for that in the config file. In fact, the patch is added in the next commit properly (and that is the right place anyway). Thus, we need to remove the line.
The commit message for the Go version bump contains a wrong bug number. I just created #32413 (moved) for that to not mix the different things up.
Thanks to boklm for helping with the review. We realized it's not clear why we need the mobile (cross-)compiler for some projects and not others (why in gobsaes and not ed25519). And why don't we need that on desktop platforms?
boklm will file a follow-up ticket to figure that out + write some documentation for our Go build setup into README.HACKING to make that and similar Go-specific things clear for those working on Go parts. Additionally, he will file tickets to track the upstreaming of the go(mobile) patches.
boklm will file a follow-up ticket to figure that out + write some documentation for our Go build setup into README.HACKING to make that and similar Go-specific things clear for those working on Go parts. Additionally, he will file tickets to track the upstreaming of the go(mobile) patches.
Just so I am clear, you are not relying on our APT library? Do you have your build working for all architectures, and loading the binaries from the libs directory so as to be properly executable? You can't just put them in the /assets folder anymore. All of this unpacking logic is part of what the APT library and API provide.
It seems you've just integrated the obfs4proxy build directly into the tor browser build process. Is this driven by a reproducibility requirement, or just a "how we do it" decision?
It would ultimately be better for the community of developers interested in using PT's for you to contribute your efforts into helping us update and maintain the reusable APT library. This is why we made it, and previously PLUTO, in the first place, and spent years investing in working out how to port these things and run them on Android and iOS. Given the funding for this working came from a shared source, I am sure they would also appreciate that, as opposed to a forking of efforts and methods.
@eighthave / hc's efforts in updating the build process are focused on the next step, as we move all the code necessary for making tor-enabled apps to shared libraries, and not standalone process executables, as we do now. This will be ultimately necessary for your team, so ideally we can align efforts here, and work on a shared infrastructure and approach.
It seems you've just integrated the obfs4proxy build directly into the tor browser build process. Is this driven by a reproducibility requirement, or just a "how we do it" decision?
I let sysrqb reply to the other points in your comment, just let me do it for this particular item: That's not a "how we do it decision". There are at least two reasons we wanted to do this: a) reproducibility and b) we want to build the latest obfs4 code in our nightly builds for mobile as well and test that in our builds. Thus, it's not enough if there are some artifacts out there even if built reproducibly. We need to have obfs4 and later on snowflake integrated into our build setup to give developers early on feedback whether change X is properly working or not in a Tor Browser setup.
Now, if that helps so that others don't need to build obfs4 and other parts (reproducibly) because of us making the build artifacts available, then that's totally doable. Just let us know what you or other projects need and we add the resulting binaries (we do already a lot of that for other needs, like BSD folks wanting some canonical source tarballs or others wanting reproducibly built mar-tools for macOS and/or Windows).
Seems like the point of shared infrastructure for the pluggable transports chunks would be the build system. If there is a simple, reliable build system, then everyone can share that.
Regularly publishing official signed tor and obfs4 Android build artifacts would be great and appreciated. Tor seems like the best source for those to come from.
All in all, I am trying to avoid redundant work, and keep our efforts in sync and efficient. We remain focused on all the ways Tor and PTs can be used and built into many apps, and not just one browser, thus our interest in providing easily reusable modular components.
(Maybe fortunately, or maybe unfortunately) we'll need to build all the binaries - executables or libraries - ourselves eventually, as gk said. However, this doesn't mean we want to duplicate the work and time you spent on developing libraries for integrating these components into apps - on the contrary, we want to work together on this and make the best use of our limited resources. I'm sorry if this came across differently.
In this specific case, TOPL still uses PLUTO and that ships with an old version of obfs4proxy. For this bug we needed to recompile obfs4proxy because we aren't in a position to migrate TOPL over to APT right now (and hopefully this won't be necessary in the future due to the TorServices work).
I would be excited about having a discussion about us publishing the build artifacts we use.
It would be great if Tor built all the binaries! Here's the ideal as I see it:
Guardian, Briar, Thali, Tor all move towards common components (libtor.so, PTs, jtorctl, TorService, etc)
Tor Project makes official binaries for all the components used in TBB
TBB uses those binary components directly, via the local gradle/maven cache that's current in use
Tor Project also pushes those binary components to Maven Central for all other consumers to use
components not used by TBB will still be released by Guardian, etc.
Between all the projects (Tor, Guardian, Briar, Thali, etc) have all the pieces of this implementing and working, we just need to rearrange things. This may seem like just shifting work to Tor Project, but if we do this right, I don't think it'll add more work for Tor Project, given the TBB requirements of building all binaries and building them reproducibly. Making TBB consume these components as binary releases will reduce the TBB flexibility a bit, but it will mean that all of the testing and integration work done by Guardian, Briar, Thali, etc. will directly apply to TBB. I think it will pay off for TBB alone because of that, and it will also greatly simplify things for the rest.
This can happen now for libtor.so and PT executables, as far as I see it. jtorctl will need work to integrate all the forks so the various projects can all use the same jtorctl. Then TorService will be easy to share once there is a canonical jtorctl.
It would be great if Tor built all the binaries! Here's the ideal as I see it:
Guardian, Briar, Thali, Tor all move towards common components (libtor.so, PTs, jtorctl, TorService, etc)
Tor Project makes official binaries for all the components used in TBB
TBB uses those binary components directly, via the local gradle/maven cache that's current in use
Tor Project also pushes those binary components to Maven Central for all other consumers to use
components not used by TBB will still be released by Guardian, etc.
Between all the projects (Tor, Guardian, Briar, Thali, etc) have all the pieces of this implementing and working, we just need to rearrange things. This may seem like just shifting work to Tor Project, but if we do this right, I don't think it'll add more work for Tor Project, given the TBB requirements of building all binaries and building them reproducibly. Making TBB consume these components as binary releases will reduce the TBB flexibility a bit, but it will mean that all of the testing and integration work done by Guardian, Briar, Thali, etc. will directly apply to TBB. I think it will pay off for TBB alone because of that, and it will also greatly simplify things for the rest.
This can happen now for libtor.so and PT executables, as far as I see it. jtorctl will need work to integrate all the forks so the various projects can all use the same jtorctl. Then TorService will be easy to share once there is a canonical jtorctl.
The libtor.so build process is done and has been tested in Orbot. I think it'll be in a release soon.
I should be able to put together a canonical jtorctl soon based on the agreement in #32534 (moved). Then I'll make a TorService release. For PTs, coordinate with @n8fr8. I'm not currently working on PTs.